name |
ePass V3 TD sur composants P5CD081V1A, en configuration EAC sur SAC via PACE v2 et AA |
ID-OneTM ePass v2.2 en configuration EAC sur composant NXP P5CD081V1A |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
01.09.2019 |
not_valid_before |
28.01.2014 |
26.08.2011 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2014-01fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2011-28fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2014-01en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2011-28en.pdf |
manufacturer |
Oberthur Technologies / NXP Semiconductors GmbH |
Oberthur Technologies |
manufacturer_web |
https://www.oberthur.com/ |
https://www.oberthur.com/ |
security_level |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
dgst |
c640b454c967f522 |
66de66c4e5617bf1 |
heuristics/cert_id |
ANSSI-CC-2014/01 |
ANSSI-CC-2011/28 |
heuristics/cert_lab |
SERMA |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.2, ALC_DVS.2, AVA_VAN.5 |
ALC_CMS.5, ASE_INT.1, ATE_FUN.1, ADV_IMP.1, ATE_DPT.3, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1, ALC_DVS.2, AVA_VAN.5, ASE_SPD.1, ASE_OBJ.2, ATE_COV.2, ALC_TAT.2, ASE_REQ.2, ADV_INT.2, ALC_CMC.4, ADV_FSP.5, ADV_ARC.1, ALC_DEL.1, AGD_OPE.1, ALC_LCD.1, ADV_TDS.4, ASE_ECD.1 |
heuristics/extracted_versions |
- |
2.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0857-2013, BSI-DSZ-CC-0555-2009 |
BSI-DSZ-CC-0555-2009 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0857-2013 |
BSI-DSZ-CC-0555-2009 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2014/01
- description: Le produit certifié est le passeport électronique « ePass V3 TD sur composants P5CD081V1A, en configuration EAC sur SAC via PACE v2 et AA », référence SAAAAR ROM 079161, SAAAAR Codop 079223, développé par Oberthur Technologies sur un composant NXP Semiconductors. Le produit évalué est de type « carte à puce » avec et sans contact. Il implémente les fonctions de document de voyage électronique c
- developer: Oberthur Technologies / NXP Semiconductors Germany GmbH
- enhanced:
- level: EAL5+
- product: ePass V3 TD sur composants P5CD081V1A, en configuration EAC sur SAC via PACE v2 et AA
- sponsor: Oberthur Technologies
- url: https://cyber.gouv.fr/produits-certifies/epass-v3-td-sur-composants-p5cd081v1a-en-configuration-eac-sur-sac-pace-v2-et-aa
|
- cert_id: ANSSI-CC-2011/28
- description: Le produit certifié est le passeport électronique « ID-OneTM ePass v2.2 en configuration EAC et AA sur composant NXP P5CD081 » développé par Oberthur Technologies sur un composant NXP Semiconductors. Le produit certifié est de type « carte à puce » avec et sans contacts. Il implémente les fonctions de voyage électronique conformément aux spécifications de l'organisation de l'aviation ci
- developer: Oberthur Technologies
- enhanced:
- level: EAL5+
- product: ID-OneTM ePass v2.2 en configuration EAC sur composant NXP P5CD081V1A
- sponsor: Oberthur Technologies
- url: https://cyber.gouv.fr/produits-certifies/id-onetm-epass-v22-en-configuration-eac-sur-composant-nxp-p5cd081v1a
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-0555-2009 |
BSI-DSZ-CC-0555-2009 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-0555-2009 |
BSI-DSZ-CC-0555-2009 |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
ANSSI-CC_2014-01fr.pdf |
ANSSI-CC_2011-28fr.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2014/01
- cert_item: ePass V3 TD sur composants P5CD081V1A, en configuration EAC sur SAC via PACE v2 et AA
- cert_item_version: SAAAAR ROM 079161, SAAAAR Codop 079223
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Oberthur Technologies 420 rue d'Estienne d'Orves CS 40008 92705 Colombes, France NXP Semiconductors Germany GmbH Box 54 02 40, D-22502 Hamburg, Allemagne Commanditaire Oberthur Technologies 420 rue d'Estienne d'Orves CS 40008 92705 Colombes, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Machine Readable Travel Document with „ICAO Application”, Extended Access Control with PACE, Version 1.3.2, BSI-CC-PP-0056-V2-2012
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2011/28
- cert_item: ID-OneTM ePass v2.2 en configuration EAC sur composant NXP P5CD081V1A
- cert_item_version: ID-OneTM ePass v2.2 en configuration EAC sur composant NXP P5CD081V1A version 2.2
- cert_lab: Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France Tél : +33 (0)5 57 26 08 75, mél : [email protected]
- developer: Oberthur Technologies 71-73 rue des Hautes Pâtures, 92756 Nanterre, France Oberthur Technologies 71-73 rue des Hautes Pâtures, 92756 Nanterre, France 22529 Hamburg, Allemagne Commanditaire Oberthur Technologies 71-73 rue des Hautes Pâtures, 92756 Nanterre, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\\(s\\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: PP EAC], version 1.10 Machine Readable Travel Document with “ICAO Application”, Extended Access Control
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0555-2009: 1
- BSI-DSZ-CC-0857-2013: 1
- FR:
|
- DE:
- BSI-DSZ-CC-0555-: 1
- BSI-DSZ-CC-0555-2009: 1
- FR:
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP- 0056-V2-2012: 1
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0068-V2-2011: 1
- BSI-PP-0035-2007: 1
|
- BSI:
- BSI-CC-PP-0035-2007: 1
- BSI-PP-0055-2009: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 1
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- NXP:
- NXP: 1
- NXP Semiconductors: 3
- Oberthur:
- Oberthur Technologies: 15
|
- NXP:
- NXP: 28
- NXP Semiconductors: 3
- Oberthur:
- OBERTHUR: 1
- Oberthur Technologies: 14
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ICAO:
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- ICAO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20140211175812+01'00'
- /Keywords:
- /ModDate: D:20140211175812+01'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 542967
- pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
- /CreationDate: D:20120213114329+01'00'
- /Keywords:
- /ModDate: D:20120213114329+01'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- pdf_file_size_bytes: 200769
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
pdf_data/st_filename |
ANSSI-CC-cible_2014-01en.pdf |
ANSSI-CC-cible_2011-28en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0056-2009: 1
- BSI-CC-PP-0056-V2-2012: 3
- BSI-CC-PP-0068-V2-2011: 3
- BSI-PP-0035: 1
|
- BSI:
- BSI-CC-PP-056: 1
- BSI-PP-0035: 1
- BSI-PP-0056: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL5: 4
- EAL5 augmented: 1
|
- EAL:
- EAL4: 1
- EAL5: 11
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 2
- ALC_DVS.2: 3
- ALC_FLR: 1
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.3: 1
- AVA_VAN.5: 3
|
- ADV:
- ADV_ARC.1: 6
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_FSP.5: 8
- ADV_IMP.1: 9
- ADV_INT.2: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 4
- ADV_TDS.4: 8
- AGD:
- AGD_OPE.1: 6
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 9
- ALC_LCD.1: 3
- ALC_TAT.1: 2
- ALC_TAT.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_DPT.3: 1
- ATE_FUN.1: 6
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS: 3
- FAU_SAS.1: 5
- FAU_SAS.1.1: 2
- FAU_STG.2: 2
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 1
- FCS:
- FCS_CKM: 8
- FCS_CKM.1: 3
- FCS_CKM.1.1: 1
- FCS_CKM.4: 4
- FCS_CKM.4.1: 1
- FCS_COP: 11
- FCS_COP.1: 2
- FCS_COP.1.1: 1
- FCS_RND: 3
- FCS_RND.1: 6
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC: 4
- FDP_ACC.1: 2
- FDP_ACC.2: 2
- FDP_ACF: 4
- FDP_ACF.1: 17
- FDP_DAU: 3
- FDP_DAU.1: 2
- FDP_ITC: 6
- FDP_ITC.1: 6
- FDP_RIP: 1
- FDP_RIP.1: 2
- FDP_RIP.1.1: 1
- FDP_UCT: 4
- FDP_UCT.1: 3
- FDP_UIT: 4
- FDP_UIT.1: 5
- FIA:
- FIA_ACC.1.1: 1
- FIA_AFL: 6
- FIA_AFL.1: 5
- FIA_API: 3
- FIA_API.1: 6
- FIA_API.1.1: 2
- FIA_UAU: 24
- FIA_UAU.1: 5
- FIA_UAU.4: 2
- FIA_UAU.4.1: 1
- FIA_UAU.5: 5
- FIA_UAU.6: 3
- FIA_UID: 5
- FIA_UID.1: 5
- FMT:
- FMT_LIM: 4
- FMT_LIM.1: 8
- FMT_LIM.1.1: 2
- FMT_LIM.2: 8
- FMT_LIM.2.1: 2
- FMT_MOF: 5
- FMT_MOF.1: 2
- FMT_MSA: 5
- FMT_MSA.1: 1
- FMT_MSA.3: 2
- FMT_MTD: 26
- FMT_MTD.1: 8
- FMT_MTD.3: 3
- FMT_MTD.3.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 3
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.1: 3
- FPT:
- FPT_EMS: 3
- FPT_EMS.1: 5
- FPT_EMS.1.1: 2
- FPT_EMS.1.2: 2
- FPT_FLS.1: 3
- FPT_FLS.1.1: 1
- FPT_PHP.3: 3
- FPT_PHP.3.1: 1
- FPT_TST.1: 3
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
|
- FAU:
- FAU_SAS: 2
- FAU_SAS.1: 9
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 7
- FCS_CKM.1: 26
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 24
- FCS_CKM.4.1: 1
- FCS_COP: 54
- FCS_COP.1: 10
- FCS_RND: 2
- FCS_RND.1: 12
- FCS_RND.1.1: 2
- FCS_RNG.1: 1
- FDP:
- FDP_ACC.1: 22
- FDP_ACC.1.1: 1
- FDP_ACF.1: 17
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 2
- FDP_DAU: 6
- FDP_DAU.1: 3
- FDP_IFC.1: 4
- FDP_ITC: 10
- FDP_ITC.1: 10
- FDP_ITC.2: 7
- FDP_ITT.1: 1
- FDP_UCT.1: 7
- FDP_UCT.1.1: 1
- FDP_UIT.1: 7
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_API: 2
- FIA_API.1: 8
- FIA_API.1.1: 2
- FIA_UAU.1: 10
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 9
- FIA_UAU.4.1: 1
- FIA_UAU.5: 10
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 11
- FIA_UAU.6.1: 1
- FIA_UID.1: 14
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 2
- FMT_LIM.1: 14
- FMT_LIM.1.1: 2
- FMT_LIM.2: 13
- FMT_LIM.2.1: 2
- FMT_MOF: 6
- FMT_MOF.1: 2
- FMT_MSA.1: 3
- FMT_MSA.3: 8
- FMT_MTD: 58
- FMT_MTD.1: 9
- FMT_MTD.3: 5
- FMT_MTD.3.1: 1
- FMT_SMF.1: 27
- FMT_SMF.1.1: 1
- FMT_SMR.1: 26
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 2
- FPT_EMS.1: 10
- FPT_EMS.1.1: 2
- FPT_EMS.1.2: 2
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 9
- FPT_PHP.3.1: 1
- FPT_TST.1: 9
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FTP:
- FTP_ITC.1: 6
- FTP_TRP.1: 6
|
pdf_data/st_keywords/cc_claims |
|
- O:
- O.HW_AES: 1
- O.MEM_ACCESS: 1
- O.MF_HW: 1
- O.RND: 1
- O.SFR_ACCESS: 1
- OE:
- T:
|
pdf_data/st_keywords/vendor |
- NXP:
- NXP: 4
- NXP Semiconductors: 5
- Oberthur:
- Oberthur Technologies: 11
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 4
- SHA-256: 4
- SHA-384: 3
- SHA-512: 4
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 4
- SHA-256: 2
- SHA-384: 3
- SHA-512: 3
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- DFA: 3
- Malfunction: 2
- malfunction: 3
- SCA:
- physical probing: 3
- side channels: 1
|
- FI:
- DFA: 3
- Malfunction: 9
- Physical Tampering: 4
- Physical tampering: 1
- fault injection: 1
- malfunction: 5
- physical tampering: 1
- SCA:
- DPA: 1
- Leak-Inherent: 2
- physical probing: 3
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 2
- EF.DG1: 5
- EF.DG14: 2
- EF.DG15: 1
- EF.DG16: 4
- EF.DG2: 3
- EF.DG3: 10
- EF.DG4: 10
- EF.DG5: 2
- EF.SOD: 3
|
- EF:
- EF.COM: 7
- EF.DG1: 12
- EF.DG13: 1
- EF.DG14: 4
- EF.DG15: 4
- EF.DG16: 13
- EF.DG2: 1
- EF.DG3: 14
- EF.DG4: 13
- EF.DG5: 1
- EF.SOD: 6
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- FIPS 197: 1
- FIPS 46-3: 3
- FIPS PUB 197: 2
- FIPS PUB 81: 2
- ICAO:
- ISO:
- ISO/IEC 15946-1: 1
- ISO/IEC 15946-2: 1
- ISO/IEC 9796-2: 1
- ISO/IEC 9797: 4
- NIST:
- PKCS:
- RFC:
|
- BSI:
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 197: 1
- FIPS 46-3: 1
- ICAO:
- ISO:
- ISO/IEC 15946-1: 1
- ISO/IEC 15946-2: 1
- ISO/IEC 9796-2: 1
- NIST:
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- and EAP protocols • Standard and biometric PIN management (therefore PIN associated commands are out of scope) • Watermarking feature 2.1.5 Usage and major security features of the TOE A State or Organisation: 1
- out of scope: 1
|
- OutOfScope:
- Access Control, • Standard and biometric PIN management (therefore PIN associated commands are out of scope), 16 FQR 110 5770 Ed1 2.7 TOE life cycle The Smart card life-cycle considered hereby, is the one: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /CreationDate: D:20130710164209+02'00'
- /Creator: PDFCreator Version 0.9.5
- /Keywords:
- /ModDate: D:20140211175713+01'00'
- /Producer: GPL Ghostscript 8.61
- /Subject:
- /Title:
- pdf_file_size_bytes: 621505
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 69
|
- /CreationDate: D:20120213114307+01'00'
- /Keywords:
- /ModDate: D:20120213114307+01'00'
- /Producer: GPL Ghostscript 8.61
- pdf_file_size_bytes: 947244
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 79
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |